Intelligence policies shaping the worlds

TEHRAN - The American people, both directly and through their representatives, are more focused on organizing and conducting the work of intelligence agencies than ever before. Because of intelligence operations play an important role in life and security. From the September 11, 2001 incident, terrorism and weapons of mass destruction are debates that are constantly being raised in American families.

Not surprisingly, there are suggestions for the transformation of organizations and the U.S. intelligence system beyond the public awareness. Foreign countries are demanding this, and many people inside the country also need to understand such a change. Many of the organizational methods and structures that have proven successful over the years have failed in some cases, especially in the September 11 incident, and have provided enough information to the United States in dealing with Saddam Hussein's weapons designs in Iraq. They did not set up the country.

Information managers and many other people who are involved do not agree with such changes. They often prefer to deal with marginal issues because information is everyday and it is time consuming to make such changes. In 1986, Casey, former head of the CIA, created a counterterrorism center. He believed that the center created the necessary coordination in design and operation, and analysts were working in the immediate vicinity of the operators, but many of the old members of the CIA and intelligence operations threatened their place and those under their control. They knew even years after the establishment of the anti-terrorist center, there has been tension between the function of the center and other elements of the organization.

Although the search for human life and government is long overdue, the new era, with the advent of advanced communications technologies and equipment, poses new conditions that require specific measures in terms of security measures.

The growth of technology and its rapid advances, along with the benefits that have disadvantages, have brought with them communications and communications equipment as a clear indication of this. In fact, today, the Internet, telephone, mobile phone and other communication devices can be described as dual sword, so that on the one hand, they are used to facilitate communication and, on the other hand, to exploit the intelligence and monitoring of information.

"I do not want to live in a country where all telephone calls are heard," said National Security Agency staff member Edward Snowden, speaking to the Guardian. With regard to Snowden's disclosures and information available today, no citizen, organization or institution in the United States and many other countries has the necessary security and privacy. With the development of sophisticated and advanced technology and advanced tools, the need for care and protection against potential damage has become increasingly important.

In today's world, with about one-third of the people having access to the Internet, and often companies, institutions, and governments require computers and communications tools for their daily work, the issue of computer security for governments and institutions, as well as ordinary people, An important strategic issue has become.

Some developments in recent years, such as the failure of Estonia's part of the computer system in 2007, the theft of Pentagon servers in 2012, and the damage to the Stuxnet Web worm to the country's nuclear program in 2010, have further exacerbated the idea that Cyber attacks are among the main threats to governments, societies and the world economy.

In 2011, a news release was made that China has a spy company. The news is also due to China's fear of China after the update of the Gastnet network. The breadth of the Chinese company and the diverse range of its intended goals, namely, companies, governments and international organizations, as well as its dedicated equipment, have made the company's activities an unprecedented hit of information.

In such a situation, against the background of Internet risks, the provision of information security based on defensive solutions seems to be more premature since it appears that information invaders appear to be asymmetric between the capabilities of digital weapons and the support tool - the defensive while concentrating more on confronting a limited range of threats. While the weaknesses in systems and the sense of state immunity from potential threats, intruders incite intelligence to exacerbate their practices on a larger scale and with larger and more ambitious dimensions.

Nowadays, the increasing use of the defects and shortcomings of information systems and computer networks and the aggravation of its results, which target sensitive infrastructure, military or government, has led some of the activities Malicious cybercrime is considered as a firefight and requires retaliatory information or physical retaliation. In the same vein, the White House has emphasized the right to defend itself against cyber attacking operations in the "International Strategy for Cyberspace" document. These elements have led to the possibility of creating appropriations, weapons and organizations aimed at cyber defense in a broader context than documents of cyber defense strategies; the main and final goal of which should be the passage of a fixed defense strategy based on "lines Magnifico defenses "and to create an approach with wider security solutions.

Thus, many countries have almost clearly stated that they are demanding the development of their cyber defense capabilities (that is, they want to be equipped with an "Adhoc" command and counter-attack equipment) to be able to respond to attacks that may be the main infrastructure of the sector.